Analysis
-
max time kernel
20s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 12:10
Behavioral task
behavioral1
Sample
5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe
Resource
win7-20231215-en
General
-
Target
5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe
-
Size
274KB
-
MD5
8bf34515e846b12fccc9a0520d597ea2
-
SHA1
b285093dc2405fc07aba7127300171003efae760
-
SHA256
5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7
-
SHA512
8a6c635fcc2eab74235044466517e913b0b217887a54866da63cc5a2f0a4ceae2b2640b02fbaa9e0428e8ad64aae0d87a2a182abf6aa1c5a3db94d09db66accc
-
SSDEEP
6144:HbTirrfykiiUjh6QH/cEOkCybEaQRXr9HNdvOa:HPcrfR6ZnOkx2LIa
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2976-0-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-65-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-106-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-115-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-218-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-582-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-620-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-654-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx behavioral1/memory/2976-676-0x0000000000EC0000-0x0000000000F4C000-memory.dmp upx -
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 -
resource yara_rule behavioral1/memory/1216-588-0x0000000008E10000-0x00000000090BB000-memory.dmp vmprotect behavioral1/memory/1216-592-0x0000000008E10000-0x00000000090BB000-memory.dmp vmprotect behavioral1/memory/1216-603-0x0000000008E10000-0x00000000090BB000-memory.dmp vmprotect behavioral1/memory/1216-591-0x0000000008E10000-0x00000000090BB000-memory.dmp vmprotect behavioral1/memory/1216-628-0x0000000008E10000-0x00000000090BB000-memory.dmp vmprotect -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\err_2976.log 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1800 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2976 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe 2976 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe 2976 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2976 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe Token: SeTcbPrivilege 2976 5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe"C:\Users\Admin\AppData\Local\Temp\5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe"1⤵
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\5e835ed7571a072287f49dd91fa964024c8807f617007b295c9a30c84fad01b7.exe"2⤵PID:2516
-
-
C:\subst.exe"C:\subst.exe"1⤵PID:328
-
C:\Windows\SysWOW64\timeout.exetimeout /t 11⤵
- Delays execution with timeout.exe
PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A
Filesize2KB
MD56adb17b51e414e9777e5772f5c87578c
SHA1337b5e906f5bd4bea5d69bdc17491d1a9337d8b7
SHA2561f0eecf94284ef614262a626d5ef641c8107dc4dce38a3ca5de6b86feaaca486
SHA5127cdc275525db57a9d378b49c16128d61e675a03d5ff69867ac2fcaa5529f99609899dae17b390bb1fce18728406795587c9b6adcc21ddbc5eb6108836715cc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5cf93404aebacdf7d1fbea37633947548
SHA1e7bb1e9ec983e316ab15e276a92df117dcf229ac
SHA25688c92be43e1fa93de8e36e46067503969ac55ac44e527ef708aae1ae938f0543
SHA512d9e71e5deb979f15904ab296e3287dc75de4e7fb13b4cf83b30719c5b7d505233c91835f46b53278612c4979f1911380aa94c86a4088043b1a92fe860d7b517c
-
Filesize
599B
MD5f96ecfa638c3aca693a31877ae91e99a
SHA14fedb6302d1a15550e7dfee93106387641e8238c
SHA2564ad36ed748113e264b363f70b889644a21b60149abd67bca3689a6fb7eb6edbe
SHA5122a6fba287020f7b42caa93552ab839ccd7bf980f8d89c39aff8a068be732ff276fd1ff0b0127bfb54ac52d8ea8e6566a12627b844db8d40ddc011ff1cb4e721e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A
Filesize484B
MD50dbe6f5f517a3bbd5bf76929b7c78883
SHA1544c6b091853d78d975d6439227af4d0bbbe9507
SHA256340aa15babc4d9a2ada64afe82b56a0233f66b905a4fcac055eb73eaffc048e6
SHA512b52a42e6f466c80f65b652e5c34788a81c7bfb0409e3125b70f2bfe0995c1cbb04b6823637717fa9b3287070e314487138b9225aef4fef789314d75c1419f1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7e43b54962328d098b4997ca2e1d23f
SHA192286423962198715b437d5d9a3a1cf9e0b57ec3
SHA256caaa7628cf32c2c25757ee591e6f92448ec2c3eb507a889e05d35fe291da2345
SHA5123e1ee8035de9fda21e86652bd7c3d86de791725184996ac97c669dcffc5b3a69266c609d445446e9b9a4088ddaf8675e7ac7cf7e3a88927352642ff1d3cd0f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d8874215341d81ddb4bca0a0bda807
SHA1822a7659dde2a48a6e702fb0a949d65fff5a7a07
SHA256cec0e7fb5ddf295faacf08a4c890216f9867f39de25a9102baec169396822a97
SHA512527f1fb8540a1fd701eb644940ec914fe333f062f509efa043c344dafad21d8fcd94105b1a1dec671199ae21b699d9a1786d4644aef6f543b8cba92dcb6df97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d744f23a10baf659b490698292c2821e
SHA1d9907e3672f215855f26aa8168e9ec530f811d96
SHA256cda4a7ce299bb883f47dd959984129b9d44291fdeb0faab6062a1061b043d536
SHA5124ab03b233f1345bfc7602716c4ae2eb1e27ba2c1e5e863f842f5e7715a16963be370e7e17f966208b4b52a1e548a4e91166dd5abe5c4188760edccead75ed0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5b830685a9c4bc07fa19363e979e264fa
SHA19f23ad507d47c3a3edaec8086f006ea82e024b5f
SHA256c23026e4ec259546c811a5406921442c6630b5f2257f8ac65e85c3589d163b95
SHA512381f1e9809c50da5b1c9d073f011fe49d90480290f21f1812b05ca0c04bf730b0b9d74280081876128d25dfa602de8a8b20f1931e3710b6e2f748c86f70eb3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4
Filesize504B
MD58d95b29c12ca5fe7ee86d4d707198814
SHA17979d1e88fb8ab42e7fe15b08f34ffc793cea7f8
SHA2563a92589744bfbe32c13e756a3bfc919e5ac36fd7a910854b95808ccaaaad31dc
SHA5124a578d0e4d4e8bee8a8951619a32e6bd957eb516685c8939cae6d841ef2e55f4e73a4316f4afbafad275556a54abbc374fd1090675e5289892e4df6444cef882
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
63KB
MD59db8b9fb2f130326985e722833fc424c
SHA1b3490bbc79d03af8dcf74cbeae5b15e4d1edb199
SHA256515cd9290c9f85844e18522e9d9ac3f0262a58e769d991a4d18f72ec3c6fee61
SHA512bb012d792a86144a7d60926ad256c17817a9a6e2ee8813fe30282fe7ec7af914c0138dc8c4fccfceed88f56187497c64d501c4f34ea87b9d2182271e0ef1c903
-
Filesize
15KB
MD5210e823866af38dea6b1383286257d45
SHA1884722f79bb55c9aaf5d350ffa9212b608afd176
SHA2561044aa234ae106cd0f668c2eb65c79e0e6b2a980bf7e97abc546fc4a5730a283
SHA5127c87c1e05eb0308da559468a6c44116c715f33bd90c5a969927f2206d0cb4e48c7c8a7fa9a7854a39a10073f9219bd10976cc0c5008dd583c6a282e65b8c421b